Semantic Scholar uses AI to extract papers important to this topic.
The term “hacking” has come to signify breaking into a computer system. A number of local, national, and international laws seek… Expand 2. FDA Regulation of Mobile Medical Applications Following the proliferation of medical devices with software components and the… Expand Several methods have been proposed to treat combat veterans with posttraumatic stress disorder (PTSD). Still, a recent review… Expand This chapter contains sections titled: Silicon for Military Computing, Defining Fairchild's Manufacturing Technology, Recasting… Expand This paper discusses the integration of perimeter intrusion detect systems (PIDS), the various elements of an overall PIDS field… Expand Examining the Strategic Computing Program after four years, in the context of the crucial recognition that it is only a small… Expand It is a common saying that a chain is only as strong as its weakest link-a phrase information security officers, IT managers… Expand Extensions of program flow monitors and n-version programming can be combined to provide a solution to the detection and… Expand Selecting or even designing a computer architecture is at best as much a black art as a science. The problem is particularly… Expand Abstract : This document is a collection of working papers produced by the members of the Computer Security Branch, Directorate… Expand